Subscription to the full report on a daily basis can be obtained:
Send an eMail to dhsdailyadmin@mail.dhs.osis.gov with the subject "DHS Daily Open Source Infrastructure Report" and the following line in the body...subscribe.
To obtain a complete copy of the current report proceed to the DHS link below.
To obtain reports more than 10 business days old, send an eMail to DHS_Reports@e-computer-security.com. Be specific as to the reports you wish to receive.

· The U.S.
Food and Drug Administration announced March 4 that it launched a mobile app
for Apple and Android devices to speed public access to information about drug
shortages and discontinuations of drug products. – U.S. Food and Drug
Administration

13. March
4, U.S. Food and Drug Administration – (National) FDA launches
drug shortages mobile app. The U.S. Food and Drug Administration announced
March 4 that it launched the agency’s first mobile app for Apple and Android
devices to speed public access to information about drug shortages, resolved
shortages, and discontinuations of drug products. The app was developed as part
of the agency’s efforts in the Strategic Plan for Preventing and Mitigating
Drug Shortages. Source: http://www.fda.gov/NewsEvents/Newsroom/PressAnnouncements/ucm436481.htm

· Cedars-Sinai
Medical Center in Los Angeles reported March 4 that 4 patients were infected
and 67 others may have been exposed to the deadly CRE superbug from a
contaminated scope. – Los Angeles Times

14. March
4, Los Angeles Times – (California) Superbug outbreak extends to
Cedars-Sinai hospital, linked to scope. Cedars-Sinai Medical Center in Los
Angeles reported March 4 that 4 patients were infected and 67 others may have
been exposed to the deadly carbapenem-resistant Enterobacteriaceae (CRE) superbug
from a contaminated scope. The hospital removed the device and enhanced their
safety measures, including a more thorough monitoring of scopes before and
after procedures. Source: http://www.latimes.com/business/la-fi-cedars-sinai-infections-20150304-story.html#

· A severe
winter storm stretching from Texas to New England prompted the federal
government, local governments, and a number of school districts and
universities to close while airlines canceled over 1,800 U.S. flights March 5.
– Fox News; Associated Press

16. March
5, Fox News; Associated Press – (National) States of emergency
declared as much of US braces for winter storm. Snow, sleet, and freezing
rain from a severe winter storm stretching from Texas to New England prompted
the federal government, local governments, and a number of school districts and
universities to close while airlines canceled over 1,800 U.S. flights March 5.
West Virginia, New Jersey, Alabama, and Mississippi all declared states of
emergency prior to the start of the storm. Source: http://www.foxnews.com/weather/2015/03/05/states-emergency-declared-as-much-us-braces-for-winter-storm/

· A fire
that broke out March 3 at the Schott Glass Technologies factory in Duryea,
Pennsylvania, caused an estimated $50 million in damage to half of the facility
and halted operations indefinitely. – WNEP 16 Scranton

24. March 4,
WNEP 16 Scranton – (Pennsylvania) Folks fear fire will close factory for good. A
fire that broke out March 3 at the Schott Glass Technologies manufacturing
factory in Duryea, Pennsylvania, caused an estimated $50 million in damage to
half of the facility. The cause of the blaze remains under investigation and it
is unclear when the factory will reopen and resume operations. Source: http://wnep.com/2015/03/04/folks-fear-fire-will-close-factory-for-good/

Financial Services Sector

Nothing
to report

Information Technology Sector

22. March 5, Help Net Security – (International) Angler
exploit kit and domain shadowing: A deadly combination. Security
researchers at Cisco Talos Group discovered that hackers have created several
hundred compromised registrant accounts, which control thousands of unique
domains that were typically compromised by phishing campaigns to redirect
victims to Web pages that host the Angler Exploit Kit, dubbed Domain Shadowing.
The attackers use and quickly abandon the subdomains housing the exploit kit,
making detection difficult. Source: http://www.net-security.org/malware_news.php?id=2980

Links

About Me

U.S. Army Retired Chief Warrant Officer with more than 40 years in information technology and 35 years in information security. Became a Certified Information Systems Security Professional in 1995 and have taught computer security in Asia, Canada and the United States. Wrote a computer security column for 5 years in the 1980s titled "for the Sake Of Security", penname R. E. (Bob) Johnston, which was published in Computer Decisions.
Motto: "When entrusted to process, you are obligated to safeguard"